Wednesday, August 26, 2020

Economic Conservation vs. Environmental Conservation Essay -- Economic

Monetary Conservation versus Natural Conservation Around the globe individuals are being influenced by preservation and imperiled species laws and guidelines. Some need the greatest house on the most delightful land and have the cash to get it, while others feel that we have sufficiently grown and there must be more land left to nature. I feel that while imperiled species ought to be secured, their assurance ought not change the way that nearby individuals work, and communicate with each other. This has provoked a clash of financial development versus ecological preservation that can be discovered both locally, for example, in Duxbury, Massachusetts, and overall, for example, the southern sloping area of Vietnam. Duxbury is a humble community on the south shore of Massachusetts situated on the coast among Boston and Cape Cod. The town’s boundary sea shore is a long flimsy landmass spreading over the whole length of the town’s coast. It is known as a boundary sea shore since it acts basically as a hindrance between the terrain coasts and the bigger sea waves. Access to the boundary sea shore, through the town, is constrained to a solitary wooden extension. Once over the extension, there is a stroll on sea shore, and a sandy street that gives access to the remainder of the promontory. Along the street there are various drive-on sea shores, which give over-sand access to four wheel drive vehicles, and toward the finish of the promontory are two little gatherings of homes called Gurnet and Saquish. Occasional sea shore grants, which are fundamental for anybody to roll over the scaffold, are offered to the two inhabitants and non occupants and these assets are utilized to keep up the ever-evolving sea shore. As indicated by the Town of Duxbury site, licenses for the 2003 season ran somewhere in the range of $45 and $110 for re... ... will live on. Works Cited Best of Boston 2003. (2003, July). Boston Magazine Fawthrop, T. (1996) Vietnam-Environment: Forest destroyers turned guardian angels. Worldwide Information Network. Recovered September 20, 2003 from factavia database. Hainer, R. (2003, August 21). In sea shore get to discuss, concom follows center of street course. [Electronic version]. The Duxbury Clipper. Recovered September 10, 2003 from, http://www.eduxbury.com/article_541.shtml Katz, D. (2003) Balance in the Bay Series: The battle, flight, and predicament of the plover, Pit falls of a refueling break. [Electronic version]. The Duxbury Clipper. Recovered September 21, 2003, from http://www.eduxbury.com/article_507.shtml2003 Massachusetts. Town of Duxbury. 2003 Beach Permits. Recovered September 21,2003 from, http://www.town.duxbury.ma.us/Public_Documents/DuxburyMA_BTPermits/file

Saturday, August 22, 2020

Racial profiling Coursework Example | Topics and Well Written Essays - 500 words

Racial profiling - Coursework Example To be sure, it has been progressively normal considering the apparent dangers to the populace by Islamic psychological militants. In this manner, in planes, Islamic-looking people are exposed to reviews and meetings of a power that white individuals are not ordinarily exposed to. The expanding quantities of wrongdoing, and the relationship by individuals that these violations radiate from race-based networks, for example, Hispanic people group, are likewise liable for the developing pattern towards racial profiling. While racial profiling is never truly enacted as an arrangement in its unequivocal sense, the ever-extending scope of techniques that a law implementation official are permitted to utilize permit the utilization of racial profiling as an authentic system. We currently continue to examining the expenses against the advantages of racial profiling. The individuals who bolster racial profiling accept that an utilitarian methodology must be taken. The contention is that since the facts confirm that there are violations which certain racial gatherings are more inclined to carrying out than other racial gatherings, â€Å"special endeavors at wrongdoing decrease coordinated at individuals from such gatherings are legitimized, if not required.† (Risse and Zeckhauser, 2004). This essentially implies lawfulness is a more significant thought than improving racial relations or battling racial disparity. Since wrongdoing has such malignant consequences for society, so the contention goes, the request for the day is to end it. Conversely, the individuals who are against racial profiling debate the position that a few races have a more prominent inclination to carry out certain violations than others. In reality, in an investigation led, the officers’ conduct of racial profiling isn't bolstered by any indicating that the criminal demonstrations in the prevalently white network were perpetrated by African Americans (Meehan and Ponder, 2002). Obviously, the more profound issue with racial

Tuesday, August 11, 2020

How Long Does Marinol Stay in Your System

How Long Does Marinol Stay in Your System Addiction Drug Use Prescription Medications Print How Long Does Marinol (Dronabinol) Stay in Your System? Be aware of side effects and interactions when taking Marinol By Buddy T facebook twitter Buddy T is an anonymous writer and founding member of the Online Al-Anon Outreach Committee with decades of experience writing about alcoholism. Learn about our editorial policy Buddy T Medically reviewed by Medically reviewed by Steven Gans, MD on December 15, 2016 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on February 03, 2020 BURGER/PHANIE/Canopy/Getty Images   More in Addiction Drug Use Prescription Medications Cocaine Heroin Marijuana Meth Ecstasy/MDMA Hallucinogens Opioids Alcohol Use Addictive Behaviors Nicotine Use Coping and Recovery Marinol (dronabinol) is a pill containing synthetic THC, a class of medications called cannabinoids. It is used to treat nausea and vomiting caused by chemotherapy.?? Marinol is also prescribed to treat loss of appetite and weight loss in people who have AIDS. Understanding how it is active in your body and how long it stays in your system can help you avoid interactions and know what side effects may be expected. How Marinol Works in Your System Marinol works by affecting the area of the brain that controls nausea, vomiting, and appetite. When taking Marinol you will also experience the effects of THC on mood, memory, and the senses as you would with medical marijuana. But in a capsule form, there is no need for it to be smoked. As a prescription drug, Marinol has a standard dosage and concentration. Your doctor will prescribe when and how often to take the capsules, timing it for the best benefit around chemotherapy sessions, for example, or at certain times of day for appetite stimulation. Marinol takes 30 minutes to 2 hours to take effect. The mental, mood and physical effects last for 4 to 6 hours, while appetite stimulation can last for 24 hours.?? Side effects of Marinol include feeling high, confusion, memory loss, anxiety, sleepiness, strange thoughts, hallucinations, unsteady walking, dizziness, nausea, vomiting. Discuss any of these side effects with your doctor as it may be necessary to change your dosage. You should not operate a motor vehicle or machinery under the effects of Marinol. You could be cited for DUI even if you have a prescription.?? Side Effects, Interactions, and Overdose Discuss all of the medications, vitamins, and supplements you take with your doctor as it may be necessary to change your prescriptions due to possible interactions with Marinol. If you start or stop any medication, alert your doctor so adjustments can be made to reduce the risk of side effects. Do not drink alcohol while taking Marinol. There can be possibly dangerous interactions with alcohol and drugs such as Valium, Librium, Xanax, Seconal, and Nembutal (benzodiazepines and barbiturates) that affect the central nervous system.?? You also should not smoke marijuana while taking Marinol as that will deliver more THC and could produce an overdose. Factors That Influence THC Side Effects Possible drug interactions can be seen with medications for anxiety, asthma, colds, inflammatory bowel disease, motion sickness, Parkinsons disease, seizures, ulcers, or urinary problems, as well as amphetamines, barbiturates, muscle relaxants, sedatives, and sleeping pills.?? Marinol should be taken only as directed. To avoid possible unpleasant side-effects and possible overdose  do  not take a larger dose, take it more often, or take it for a longer period of time than prescribed by your healthcare provider. Some side effects of an overdose of Marinol include: DrowsinessInappropriate happinessSharper senses than usualChanged awareness of timeRed eyesFast heartbeatMemory problemsFeeling that you are outside of your bodyMood changesDifficulty urinatingConstipationDecreased coordinationExtreme tirednessDifficulty speaking clearlyDizziness  or  fainting  when standing up too fast Potentially dangerous side effects are seizures and a fast, pounding heartbeat. If those occur, call your doctor immediately. How Long Marinol Remains in Your System The synthetic THC in Marinol is absorbed by your body similarly to the THC naturally occurring in marijuana. It is also stored, broken down, and excreted the same. Marinol is broken down and excreted in the urine for two days to 5 weeks. During this time period, it will be detected in urine drug screens. Some of the THC in Marinol is stored unchanged in fat cells in the body. When it is released from fat into the body, it can again exert its psychoactive properties, as well as be metabolized and be excreted in the urine. The half-life of fat-stored THC is about 10 to 13 days. THC can also be stored in hair follicles, where it may be detected for up to 90 days.?? How long the THC from Marinol persists in your body depends on your metabolism, body mass, age, hydration level, physical activity, health conditions and other factors, including how long you have been taking the medication. If you have to take a drug screen for employment or other reasons, be sure to disclose you are taking a prescription for Marinol so this can be taken into account. How Long Do Drugs Stay In Your System

Saturday, May 23, 2020

Advertising Sex Sells Essay examples - 1365 Words

Advertising is a billion dollar market with a sole purpose to persuade the consumer to purchase some type of product or service. Companies use many different methods to convince the public to spend money on their products with most of their advertising focused around the idea of â€Å"sex sells†. This idea promotes a hunger in the consumer for gaining personal pleasure or acceptance of sexuality by the eye catching effects of publicly baring flesh. These ideas are promoted through TV commercials, billboards, magazines, radio ads, or any type of media targeted at the mass majority of people. Every where a person looks there seems to be some type of advertising based on sex. The illusion of making one feel they want, need, or cant live without†¦show more content†¦An average person would look at this and attach the idea of sex appeal and the view of being complete to a Nissan Altima. The Marxists would claim that this is just a fantasy that the corporate economy uses to sell goods and services. This type of advertising works because people are no longer seeing sex only as a way of reproduction, but as a way of acquiring pleasure. Another ad that sticks out is the Calvin Klein ad for perfume which has a lady wrapped in what looks like a sheet that is barley covering her breast leaving one to only imagine them selves creating this same image by buying the product. From a Marxist view the argument would be that corporations are only using sex for one thing and that is to create a desire in the consumer to buy products. They feel that the consumers, â€Å"style, grooming, or body piercing can communicate who we are or how we want others to think of us† (Seidman 17) so why not use this to their advantage to create an ideal self that people will buy. In many of the ads in this magazine there is an idea of creating attractiveness, desire, love, and a sense social acceptance that can be brought. One would argue that there is no way to buy perfect ion, but the way advertising is done it makes it hard to believe. As in most advertising this issue of Essence magazine only appears to be focused on women in sexual acts or positions to sell goods creating a concern of what is really being sold. When looking at aShow MoreRelatedAdvertising: Sex Sells Essay example1765 Words   |  8 Pagesmagazine? I would like to look like her. What do you say to your self when you see the product? Will this product help me look like her? Magazines play a part in creating the image of sex sells. Advertisers use an image to create an advertisement to sell a product. The Purpose of advertising is not to sell sex, but to attract the consumer. Their talent is the ability to transform seemingly neutral object to create a desirable product. It’s no wonder that we are so obsessed with our bodies andRead MoreEssay on Sex Sells in Advertising768 Words   |  4 PagesA Great Moment In Creativity In 2010 Diesel released their spring campaign tagged, â€Å"Sex Sells, Unfortunately We Sell Jeans.† This was a follow up on their â€Å"Be Stupid† campaign, which helped re-establish the brand amongst consumers. The brands image was able to portray a sexy idea while still having enough humour to be appreciated by a large audience. Although the idea of using sex appeal in advertising is not new, Diesel ran into trouble with this campaign as a large number of the public statedRead MoreWhat Makes Sex For Advertising So Appealing?1674 Words   |  7 Pages Sex is a very controversial subject that normally attracts a lot of attention, which forces it be extremely exploitable for attention craved advertisement creators. Sex can be defined as ways to gain consumers attention (Belch Belch 2007). What makes sex in advertising so special? Why is sex so appealing to consumers? Sexual appeal can be characterized as an emotional trigger. Sex can be construed as the soul of advert ising. (Brayan 2003) There are various emotions that an advertiser can utilizeRead MoreAdvertising Analysis : Tipalet Advertising1121 Words   |  5 PagesTipalet Advertising Tipalet was a company from the late 1960s known for its Tipalet cigarette and its provocative advertising. The company ran several advertisements focusing on a man and a woman smoking. Their most known advertisement was a magazine full-page ad featuring a man looking into a woman’s eyes and blowing smoke at her. The advert shows both young adults in a healthy state with the woman leaning in closer to the man’s exhaled smoke. Towards the bottom of the page, surely not coving theRead More Media Advertising and Sex Essay1210 Words   |  5 PagesAdvertisements are everywhere, combining images and words together to create a message to sell a product. The initial impression is that the advertisers are just trying to sell their products, but there often seems to be an underlying message. It is often heard that â€Å"sex sells.† So, many advertisers will use beautiful women and men in their advertisements to try to market a product. The hope is that â€Å"sex will sell,† and people will go out and buy what the ads are selling. There are many advertisementsRead MoreThe Problem About Using Sex in Advertisements Essay1269 Words   |  6 PagesAdvertising is an important form of communication between products and customers. How to get viewers’ attention is first thing need to consider for advertising. Sexual appeal is become very useful tool in advertising, and it use is increasing. The sex appeal has a very long history, the first sex appeal advertising was introduced in 1911 by Woodbury’s Facial Soap (Campaign,2014). Once this advertising is released it has caused an enormous controversy, it is considered so risquà © and inappropriateRead MoreSex in Advertising1358 Words   |  6 PagesSex in Advertising I chose sex in advertising for my research topic because I do not know about it well, even though a lot of sexual images and texts in advertisements. When I was a little kid, I often surprised by ads with sexy woman. Even now, I sometimes have my eyes glued to such kinds of advertising. I wonder that there are some physiological reasons why people pay attention to sex images. Also, learning about sex in advertising is useful for my career because I want to work for an advertisingRead MoreDoes Sex Sell?986 Words   |  4 PagesMandaluyong, Benhur Abalos and Valenzuela mayor, Sherwin Gatchalian (Naredo Pedrasa, 2011). Many were offended by how many innocent children can perceive those titillating images. These scantily clad models that are in the billboards are made to sell and appeal for our sexuality to our human instincts. Sexuality is both an attribute and constitutive (Cenzon, 2008). According to Thomas Hobbes (n.d.), â€Å"Man is a collection of base, animal urges. To act on them and experience sinful pleasures wouldRead MoreSex Should Not Sell865 Words   |  4 PagesSex should not sell Do not ever underestimate the persuasive influential power, of gorgeous women with more cleavage, or the power of a gentleman with a muscular body, to increase the consumer’s consumption. Tom Reichert in his book â€Å"The Erotic History of Advertising† emphasizes the idea that sometimes this frequent use of the sex sells technique increases some consumer interest and builds a strong brand identity (Reichert). In fact, Sex was used to advertisements since the 1900’s when theRead MoreNegative Effects of Sex in Advertising1151 Words   |  5 Pagescommercials that you see everyday? They simply use sex. Sex in advertising can be defined as the use of any type of sexual imagery to draw the interest of the consumer to buying a particular product or service. The use of sex in advertising as mentioned earlier is said to have boasted a lot company’s revenues, but it also has its negative side which has caused a lot of problems in societies around the world. The idea of using sex in advertising is a very smart way that advertisers use to gain attention

Tuesday, May 12, 2020

Development of moral reasoning and self-control from birth through adolescence Free Essay Example, 1000 words

Stage 2: Personal Reward Orientation Personal reward orientation stage or also known as the instrumental stage determines right or wrong through deeds and not punishment. People at this stage believe in the lines of â€Å"scratch my back I scratch yours. † People at this stage value others in terms of utility and their actions that satisfy their needs will determine a wrong or a right. Justice at this stage is two way, you do me I do you or simply â€Å"do unto others what shall be done unto you. † Individuals at this stage only do what is necessary to satisfy their own desires. Level Two Stage 3: Interpersonal Conformity This level involves an individual trying to be significant to others and to accept the rules of one’s group. Societal laws and the expectations of the society are key considerations at this stage while trying to solve a moral dilemma because an individual wants to be good to his or her people. This level affects individuals’ up to middle age and has two stages namely interpersonal conformity also known as good boy good girl orientation and the law and order conformity. We will write a custom essay sample on Development of moral reasoning and self-control from birth through adolescence or any topic specifically for you Only $17.96 $11.86/pageorder now The first stage an individual tries to conform to the stereotype behaviors of his peers and group members and good behavior is that which helps people within the group or the group approves. Individuals act in a way to please authority figures and people of a higher caliber than they do. Forgiveness at this stage is the most preferable to revenge and failure to punish is unfair because it will motivate the other individuals also to mess with impunity. Individuals at this stage try to obey their peers and show respect to their group leaders. An individual earns approval by being nice and such titles as good boy or good girl are common too refer to those whose behavior is acceptable. An individual tries to be nice to others to be seen as good. This statement however has seen Kohlberg receive criticism because of its bias against women (Eysenck, 2004) Stage 4: Law and Order Conformity The second stage of this level individuals look unto the whole society for guidelines and rules pertaining what is right or wrong. Anything that is punishable by the society, whether right or wrong is generally wrong to individuals at this stage. Individuals at this stage view the societal rules and regulations as very inflexible and they do not recognize that as the society’s needs grow the rules should change as well. Justice is when a person who has done the society wrong receives some punishment. Laws are the pivotal point at this stage and therefore members try to be good to others while at the same time obeying the laws.

Wednesday, May 6, 2020

Coach Carter Free Essays

Abydos Passion Play is mainly considered to be the first play to ever be performed and depicted as a religious ritual or event. Zen Buddism is one for most common and well-known Japanese Dada. It is the kung fu monks. We will write a custom essay sample on Coach Carter or any similar topic only for you Order Now How to read a Play according to Aristotle you must have six parts in order to read a play. Character, plot, thought, music, diction and spectacle. Blindness as it is depicted in Oedipus Rex, signifies the ignorance a character possesses (Oedipus was blind to the clues of his birth). The Noh Play Production is an interesting Japanese production that contains only male actors, and revolves around Zen Buddism. The Noah play is very simplistic in terms of the design, usually with prayer and front-center stage. It also involves musical structure. Character * Physical * Socio-economical * Psychological * Moral/Ethical Noah and his sons is a play with major dramatic structure. It was written in the middle ages, depicting the Great Food. Noah is the main character of the play. In my opinion the major question in this play is, will Noah fulfill God’s orders on a consistent basis? He argued and fought with his wife at all times, they could never be on one accord, and have more good days then bad days in terms of their marriage. His physical appearance in this play was around his 50s and 60s in terms of age. He is introduced in the play to be considered as an old, still aging 600 and some years old. He has a wife and has children. The socio-economical of this play Noah and his sons is that they were believers in Christ but really never obeyed God especially Noah he was very stubborn and never listened to anyone. The Psychological perspective of this play is that Noah mentally disobeyed God in all of his ways in orders. He also threaten to beat his wife, then as they play goes on he and his wife agree stop fighting and become together as one. The moral/ethical perspective of this play is God. It’s simple to respect God and his orders. The flood only happened because the flood and the only way they were saved are because of the Arc. Personally if I was them I would always listen to God, because disobedience to God could lead to consequences. How to cite Coach Carter, Papers Coach Carter Free Essays Questions for Movie Coach Carter Spring 2011 1. In the first scene of the movie the team members were arguing and even fighting in the locker room. One member identified himself to the news media that he was the â€Å"star player†. We will write a custom essay sample on Coach Carter or any similar topic only for you Order Now As Coach Carter identified in the movie, they had only won 4 games. By the last scene of the movie, the team went to the championship games. What do you think made the difference in the team’s ability to become winners? 2. In a scene of the movie, Coach Carter made two of the best players leave for failing to follow his instructions, knowing that this would hurt the team’s possibility to win games. One player even pointed out that they were the highest scoring players. Coach Carter’s response was, â€Å"I guess we will have two more high scoring players. † What do you think was Coach Carter’s rationale behind his decision? 3. What was the significance of the contract Coach Carter had the team members sign? Why did the contract include the team members having to wear a tie on game day? Why did they have to maintain a 2. 3 grade point average to play? 4. What did Coach Carter mean when he told the team, â€Å"The losing stops now. Winning here means winning out there. † 5. At the beginning of the movie, Coach Carter asked the question, â€Å"What is your biggest fear? † this same question was asked by him several times throughout the movie. After the team was benched, a player stood up and gave his definition of fear (see below). Describe in your own words the significance of this summation and how it relates to living life. How does this relate to our studies of Juvenile Delinquency? 6. Upon review of the various theories we have studied over the past several classes, which delinquency theory (s) can you identify from scenes in this movie? Briefly describe those theories you observed. How to cite Coach Carter, Essay examples

Saturday, May 2, 2020

Attacks Taxonomy On Bring Your Own Devices -Myassignmenthelp.Com

Question: Discuss About The Attacks Taxonomy On Bring Your Own Devices? Answer: Introducation Aztek has a large network of employees, customers, partners, vendors and stakeholders. The primary goal of the organization is to enhance its customer base by providing better, accurate and secure financial services along with the enhancements of revenues. BYOD will allow the use of employee-owned devices which will lead to better productivity of the employees and will assist in the achievement of the goals. The project is feasible from the organizational point of view. The operations that will be carried out by the employees will be tracked and monitored using remote tracking and management. The employees will also be able to access the organizational tools and applications from their homes and outside of office premises to gain hands-on on the applications. This will lead to lesser occurrence of operational mistakes. The BYOD scheme will therefore be feasible from the operational point of view. Technical tools and applications that are being used by the organization are compatible with most of the recent and widely used operating systems. These tools will be easily integrated with the devices of the employees. Also, the security department will install the necessary technical controls and applications for enhancing the security of the device. The project is feasible from the technical point of view. There are no laws or regulations created by the Australian Government regarding the prevention of employee-owned devices in the offices. There are specific rules to financial industry that will be adhered during the project along with information privacy laws. The project is feasible from the political point of view as well. There are many risks that have been identified from the security aspect in association with the BYOD scheme. These risks may emerge as the potential disadvantages for the project. However, it is possible to put a check on these risks and avoid them by using correct set of methods, plans, policies and controls. There will be many advantages that will be offered with the implementation of BYOD in the organization. The first advantage would be in the form of reduced costs. The costs associated with the procurement of the devices, maintenance of the devices, infrastructural and operations costs will be reduced. The employees will be allowed to access most of the organizational tools and applications from any of the remote location which would enhance their operational excellence leading to better productivity and efficiency levels. The customers will also be satisfied as their demands will be met and the quality of services will also improve. This would lead to better revenues and market shares as well. Financial Services Review Aztek has decided to allow the employees to bring their personal devices at the workplace for the execution of professional tasks and activities. The company is based out of Australia and the country does not have any specific laws in place for the governance and surveillance of the employees making use of any form of application or service outsourcing. However, the specific business domains do have certain rules and regulations defined. The business domain and functional area for Aztek is finance. There are two primary jurisdiction areas in Australia that is, New South Wales and Australian Capital Territory. The use and application of the electronic communication and networking varies in these areas which shall be followed by Aztek as per the service territory. Australian Securities and Investment Commission (ASIC) is a government body that regulates all the financial transactions and services at the federal, state and territory levels. There are laws that have been set up under this body for the regulation of electronic payments under the e-payments code and for the financial access control and management as well. These laws and guidelines shall be followed (Asic, 2017). BYOD scheme would allow the employees to make use of their devices for the organizational activities outside of the office premises as well. NSW is an Act that has been defined for the surveillance of the employee activities and processes beyond the office premises. The communication and operational activities will be tracked on the employee device under this act and there would be restriction on the sharing of information with the resources outside of the office or a particular project. Aztek may also make use of overt surveillance which would involve automated software for the purpose of tracking. In this case, the employees must be told about the same 14 days prior to the conduction process. The employees may also exchange emails and messages using their devices which may include financial information and details. Workplace Privacy Act 2011 has been defined by the Australian government for the email surveillance and tracking. The data that will be exchanged by the employees on their mail servers will be monitored by Aztek as per the rules of this act (Act, 2016). Telecommunications Act 1979 has also been defined by the Australian Government to cover the permissions that are associated with communication interception. It has been established to ensure the integrity of the communications so that any of the unknown communications do not take place. This act only covers the content tracking and does not include the tracking of email address or metadata (Coe, 2011). The financial information that will be processed and managed by the devices of the employees under the BYOD scheme would also be required to abide by the rules under Intellectual Property and information privacy. The privacy and security of the information will be maintained under these laws and regulations. Privacy Act (APP 5) has also been defined for the maintenance and management of the information privacy. The devices of the employees must not store or process the personal information of other employees or the customers of Aztek. The access rules and the user privileges shall also be defined for the purpose of information access. In case of a data breach, the employees must be aware of the process that they must follow for reporting the matter to the senior management (Oaic, 2014). Security Posture of Aztek There are a number of security postures and policies that must be considered and modified in association with Aztek with the introduction of BYOD scheme. It would include the current state of security in the organization, use of mobile devices currently in use along with the future use of the devices, geographical strategies that shall be followed for the deployment of the project. The finance industries that are present in a particular country need to abide by certain rules and regulations at the federal and state level along with the territory and industry level. Such financial constraints and necessities have been discussed in the section above. In case of Aztek, another area of concern that shall be monitored and handled is the security of the devices, information and networks. There are certain weaknesses in the current security state of Aztek which are included as follows: There are numerous obsolete devices and security mechanisms that are being used in the organization. For instance, there are many of the computer systems and gadgets that are in use which are more than 5 years old. Some of these systems cannot be updated as per the latest technological concepts and security frameworks. These systems and components shall be removed and replaced by the newer systems. The use of identity and access control is Aztek is still restricted to the magnetic card readers and identification. There are newer forms of controls that can be used for this purpose, such as biometric recognition. There is an excessive use of in-house storage and management of the information that is associated with the organization. The file servers and database servers are also located in-house which makes it a single point of failure. In case the attacker succeeds in gaining access to these locations, then the security breach would be huge. The legacy systems that are being used by Aztek are also technically not sound and need a lot many updates to be done. The security loopholes that have been identified above will require a lot of investment to be done to make sure that the security infrastructure is improved. With the use of the BYOD scheme, there will be many devices that will be brought by the employees in the organization and the need to procure additional set of devices will not be required. However, this scheme will have its own security risks and concerns. Securing Devices and Information In the organizations that have a single vendor or manufacturer of the devices, it is easy to control the security status through unified management. There is a single set of security control and checks that need to be implemented to attain overall security of the devices. However, in the case of outsourcing, the security policies and plans that are required to be followed are different. The employees in this case will bring their own devices to the organization which will have different security framework, different operating systems, different data and information capabilities etc. There is no uniform security scheme that can be designed and implemented so that the overall security of all the devices is ensured. The device portfolio will also expand with the BYOD scheme with the inclusion of Smartphones, laptops, tablets etc. from different sources. The current security policy will therefore require many updates to be done and installed (Curran, Maynes and Harkin, 2015). The approach such as locking down of the devices outside of the company networks would not work as the devices are personally owned by the employees and the practice would discourage them to adapt to the BYOD scheme. A flexible approach which is also secure would be required for the management of the risks. The use of access control on the official applications that include critical and sensitive information can be done outside of the office network (Gillies, 2016). There are many risks that are associated with the device itself. For instance, the device of the employee may get lost or may get stolen by an entity that may get access to the organizational information if the device would be connected to the VPN. The confidential information would then get exposed to such unauthorized entities and for this device tracking and security would be of utmost importance. There may also be ownership issues that may crop up. The employees will be the owners of their devices and would like to have a complete ownership on their data and information. They may attempt to jailbreak the devices which may have an extremely negative impact on the device security. The terms and conditions under the BYOD scheme shall therefore be clearly explained to the employees before they agree to bring their devices at the workplace (Tokuyoshi, 2013). There are also certain basic mechanisms that can be used for the protection of the devices and the information present in these devices. The security team must investigate the devices to highlight the alignment with the security policies of Aztek. Mobile device management must be carried out by the team of the auditors and reviewers. Device encryption, remote wiping and the use of PIN codes shall be done for device and information security. The use of certified software and critical information sets must be restricted on the office networks only (Beckett, 2014). Addressing the Application specific Risks With the use of BYOD scheme, there can be two categories of application specific risks that may be observed. These risks include the malware attacks through the applications that are installed which would demand the highest level of malware protection. There may also be exploitation of the security vulnerabilities present in the application which may lead to the compromise of the security of sensitive and confidential information. Enhanced application management will be necessary for this purpose so that such risks are avoided and controlled (Romer, 2014). There shall also be upgrades and security updates that must be installed in the devices and for the applications that are present in the devices to make sure that the security risks specific to device version or application version are avoided. Risk Assessment The Cybersecurity framework that is followed in this case is based upon the flexible and high performance mechanisms that can be used for the enhancement of the security posture in an organization. The core of the framework includes the definitions for the functions along with the categories and sub-categories along with the references that come under the security checklist. The set of functions comprise of the risk identification, asset protection, incident identification, planning of the responses along with the recovery of the data. There are different categories that are used including asset management and control, access management and control, detection and prevention systems. The information security mechanisms against the security risks that are defined have been done for the information in transition along with the information at rest. There are different tiers to security that Aztek must follow and consider and it must be ensured that the security state must move towards the highest tier. Tier 1 is the state in which there is a partial protection of the organizational assets and the processes are defined but not formalized in association with security. Tier 2 is the state in which the risks have been identified and a formal procedure for the management of the risks has also been created. Tier 3 is the state in which the management approves of the protection and security measures that must be used. There is a use of consistent methods in this case. Tier 4 is the state that includes adaptive risk management to make sure that the organization is efficient to handle the changing threat landscape. In case of Aztek, the BYOD scheme will bring with it a lot many new challenges and issues. The employees of an organization may also change and there may be new devices that may be added in the set of devices to be managed by the organization. There will be a continuous change in the threat landscape and therefore, the risk assessment process that is followed in this case shall be in tier-4 (Singh et al., 2014). TVA Analysis An analysis of the threats and vulnerabilities has been done in association with the BYOD scheme and the results have been summarized in the table below. Risk Name Risk Impact (1 to 5 with 5 being highest) Risk Probability (1 to 5 with 5 being highest) Risk Rank (Impact x Probability) Suggested Response Strategy Information Breach 5 4 20 Risk avoidance Information Leakage 4 4 16 Risk avoidance Information Loss 4 4 16 Risk avoidance Lost/Stolen Devices 5 2 10 Risk mitigation Insider Threats 5 4 20 Risk transfer Man in the Middle Attacks 3 3 9 Risk avoidance Spoofing Attacks 4 3 12 Risk avoidance Application and System Vulnerabilities 3 4 12 Risk avoidance Hacking of the APIs 3 3 9 Risk mitigation Denial of Service Attacks 4 3 12 Risk avoidance Malware Attacks 3 5 15 Risk avoidance Phishing Attacks 4 3 12 Risk mitigation Eavesdropping Attacks 3 4 12 Risk avoidance Social Engineering Attacks 5 4 20 Risk mitigation Table 1: Risk Register Countermeasures Security Programs There are several countermeasures and security programmes used to make sure that the risks that have been assessed above are handled carefully. Aztek must define the scope, objectives and the set of goals in association with outsourcing the use of BYOD scheme. These definitions must be based upon the security aspect and must consider the use of devices in the office premises along with the outside networks as well. The next step shall include the prioritization of the risk handling and the implementation of the treatment strategies. These shall include the treatment of the risks with higher impacts in the first phase followed by the treatment of the risks that may have a low probability and impact (Kumar and Singh, 2015). There would also be risks that may have an impact on the specific information sets and categories. The risks that may have an impact on the sensitive and critical data sets must be identified and the mapping response strategies shall be created. These risks shall be handled at the top priority. Once the initial round of planning and analysis is completed, there shall be mapping on the type of the countermeasure that shall be applied. For example, there are certain risks that can be controlled and avoided by using administrative checks only while there are a few risks that may demand a technical tool and application for the avoidance and management of the risk (Stoecklin et al., 2016). There are several countermeasures that have been developed which can be applied in order to overcome, avoid, prevent, detect and control the security risks that are associated with the decision of Aztek to provide the employees with the permission to bring their devices at work. These controls and countermeasures are as described below: Preventive Controls: These are the control measures that shall make sure that the occurrence of security risks does not take place by using mechanisms like advanced access control and authentication. Also, the setting up of firewalls and proxy servers would come under this category. These controls form the basic approach towards the maintenance and management of security. Detective Controls: There may be cases when the preventive controls may fail and the malevolent entities may succeed in violating the access or basic security measures. In such cases, these controls shall be applied which shall highlight the activities of the attackers by making use of integrity checks, security logs and audits along with intrusion detection tools. Corrective Controls: There are advanced methods that are used by the attackers to give shape to the security attacks. They may succeed in passing through the preventive and detective controls. The corrective controls are the ones that shall be used for the control and minimization of the damage. The use of encryption is one of the examples of such controls which would protect the information even if it gets exposed to the attackers (Blizzard, 2015). Deterrent Controls: The attackers must be made aware of the readiness of the organization to deal with the security risks and attacks. These controls are the measures that send across this message by using advanced network monitoring and maintenance of the network and security logs. Recovery Controls: There are security controls that have been set up with the purpose of disaster recovery. These controls are similar to the corrective controls but are applied in more significant damages and impacts. There are various attempts that the organization must make so that the continuity of the business operations is maintained and the backup of the data is also created and updated at the regular intervals. Compensating Controls: There may be cases when the required security control may take time to be developed and implemented. In such cases, the security of the application, service, system or device shall be maintained by using an alternative measure, such as use of patches in case of security updates or installations. Data Security Data is one of the biggest assets for Aztek as it is the case with every other organization and there are various measures that may be used and implemented for making sure that the risks associated with the data and information are avoided. Some of these measures include access control, incident recording and resolution, privacy standards, codes of conduct, use of social media, encryption techniques, anti-denial and anti-malware tools etc. These may also include the employee and user awareness along with training sessions on the security practices to be followed. In case of the BYOD scheme, the probability and the types of probable risks increase as there are different access points that may be used for giving shape to the attack. The attack surface would increase along with the attack window. Aztek would be required to make use of end-to-end data protection techniques to make sure that the security risks and attacks are avoided. The mismanagement of the devices that will be owned by the employees may be the biggest contributor in the occurrence of the data security attacks and risks. There must be policies that must be created for data protection in case of employee resignation and transfer. The tools, applications and information present in the device of the employee shall be allowed to be remotely wiped out and a cross examination of the same shall also be carried out. There can be severe implications in terms of financial and legal obligations that may be caused with a weak data security. There are certain measures that must be used to avoid the same. There shall be advanced log maintenance maintained in the organization in terms of the device activity in Aztek and the employee activity on the devices and applications. The company must take up the responsibility of managing the user passwords and PIN codes. In case of default passwords and PIN codes usage, there are various security vulnerabilities that come up. There shall be use of automated password managers along with the alerts on password change at frequent intervals. The use of common passwords like name, DOB etc. shall be avoided. The critical applications associated with Aztek must be installed in the devices owned by the employees but shall be accessible only when the device is connected to the corporate network. The employees must be provided with the training session on the security practices that they must use along with the common security mistakes that take place which shall be avoided. Data Classification Security Analysis There is a lot of data that is managed by Aztek that belongs to different categories and may have different security requirements. The following table defines the data classification and the corresponding security strategies that shall be applied. Type of Data Information included under this classification Damage to the Information Sets in case of security attack Security strategy to be used Highly sensitive data Social security numbers of the employees and customers, PIN codes and passwords to access the bank accounts In case of a security risk or an attack to this type of information, there may be legal or financial obligations that the organization may have to face in terms of legal punishments or financial penalties The highest form of security shall be applied to protect this information. Only the CEO and CIO of the organization shall be allowed to access this data category and there shall be no modifications allowed by any entity (Morrow, 2012). Sensitive and Confidential Internal Data Contract information with the third part vendors, details of the projects taken up by the organization The reputation of the organization in the market may suffer as the customers will not be able to invest their trust in the organization and the competitors may gain advantage of the disclosed information (Yoo, Park and Kim, 2012) The administrative and technical controls must be used to protect this category of information. There shall also be physical controls set up with data access provided only to the CEO, CIO, Data administrator and Security Manager. Private Data Internal organizational charts, communication mechanisms, project methodologies and approaches There may be negative implication in terms of the stakeholder engagement as the internal details of the organization will be revealed in public The administrative and technical controls must be used to protect this category of information. There shall also be physical controls set up with data access provided only to the CEO, CIO, and Data administrator, Security Manager, Security Analyst, Stakeholders and Data Scientists. Public Data Solutions provided by the organization, list of products offered, names of popular clients The data shall be disclosed only as intended by the management of the organization. In case of the early disclosure, there may be negative implications in terms of the competitive advantage to the other entities in the market The information shall be protected by using the security controls and mechanisms and the stakeholders shall be able to view the information with modifications to be applied only by the data administrator. Table 2: Data Classification Security Analysis Conclusion The management and administration at Aztek has decided to implement the Bring Your Own Devices (BYOD) project. BYOD scheme would allow the employees to make use of their devices for the organizational activities outside of the office premises as well. The finance industries that are present in a particular country need to abide by certain rules and regulations at the federal and state level along with the territory and industry level. Such financial constraints and necessities shall be followed by Aztek in the implementation of BYOD, such as adherence to ASIC guidelines, Intellectual Properties laws etc. The device portfolio will also expand with the BYOD scheme with the inclusion of Smartphones, laptops, tablets etc. from different sources. The current security policy followed at Aztek will require many updates to be done and installed. There may be risks to the devices, information in the devices, applications, systems and databases. There shall be upgrades and security updates that must be installed in the devices and for the applications that are present in the devices to make sure that t he security risks specific to device version or application version are avoided. There shall be use and implementation of advanced security plans with controls such as preventive, detective, corrective, deterrent, recovery and compensatory controls. For the protection and safety of data, measures like access control, incident recording and resolution, privacy standards, codes of conduct, use of social media, encryption techniques, anti-denial and anti-malware tools etc. shall be used. These may also include the employee and user awareness along with training sessions on the security practices to be followed. References Act (2016). Workplace Privacy Act 2011. [online] Available at: https://www.legislation.act.gov.au/a/2011-4/current/pdf/2011-4.pdf [Accessed 26 Sep. 2017]. Asic (2017). ASIC Home | ASIC - Australian Securities and Investments Commission. [online] Asic.gov.au. Available at: https://asic.gov.au/ [Accessed 26 Sep. 2017]. Beckett, P. (2014). BYOD popular and problematic. Network Security, 2014(9), pp.7-9. Blizzard, S. (2015). Coming full circle: are there benefits to BYOD?. Computer Fraud Security, 2015(2), pp.18-20. Coe (2011). Telecommunications (Interception and Access) Act 1979. [online] Rm.coe.int. Available at: https://rm.coe.int/1680304330 [Accessed 26 Sep. 2017]. Curran, K., Maynes, V. and Harkin, D. (2015). Mobile device security. International Journal of Information and Computer Security, 7(1), p.1. Gillies, C. (2016). To BYOD or not to BYOD: factors affecting academic acceptance of student mobile devices in the classroom. Research in Learning Technology, 24(1), p.30357. Kumar, R. and Singh, H. (2015). A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System. ACM SIGSOFT Software Engineering Notes, 40(1), pp.1-4. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), pp.5-8. Oaic (2014). Chapter 5: APP 5 Notification of the collection of personal information| Office of the Australian Information Commissioner - OAIC. [online] Oaic.gov.au. Available at: https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-5-app-5-notification-of-the-collection-of-personal-information [Accessed 26 Sep. 2017]. Romer, H. (2014). Best practices for BYOD security. Computer Fraud Security, 2014(1), pp.13-15. Singh, M., Sin Siang, S., Ying San, O., Hassain Malim, N. and Mohd Shariff, A. (2014). Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model. International Journal of Mobile Network Communications Telematics, 4(5), pp.1-17. Stoecklin, M., Singh, K., Koved, L., Hu, X., Chari, S., Rao, J., Cheng, P., Christodorescu, M., Sailer, R. and Schales, D. (2016). Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM Journal of Research and Development, 60(4), pp.9:1-9:13. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), pp.12-13. Yoo, S., Park, K. and Kim, J. (2012). Confidential information protection system for mobile devices. Security and Communication Networks, 5(12), pp.1452-1461.